DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection

Researchers at ReliaQuest warn of persistent malware campaign targeting enterprise credentials - Read more

One Click Away: Inside a LinkedIn Phishing Attack

By Enrico Silverio, Cofense Phishing Defense CenterYou’re checking your inbox like any other day when a LinkedIn notification pops up, hinting at a promising...

What’s new in ECK: AutoOps Cloud Connected, air-gapped registry support, and composable configuration policies

ECK 3.3.1 adds AutoOps Cloud Connected for automated cluster health monitoring, a self-hosted Package Registry for air-gapped Fleet support, and composable Stack Config Policies...

Microsoft Issues Critical WinRE and Setup Updates Ahead of 2026 Secure Boot Certificate Expiration

Microsoft has rolled out two new dynamic updates, KB5081494 and KB5083482, designed for Windows 11 versions 24H2 and 25H2. Released on March 26, 2026,...

AI Threat Landscape Digest January-February 2026

KEY FINDINGS AI-assisted malware development has reached operational maturity.VoidLink framework, which is modular, professionally engineered, and fully functional,was built by a single developer using...

Chromium: CVE-2026-4673 Heap buffer overflow in WebAudio

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see (https://chromereleases.googleblog.com/2026) for more information. - Read...

European Commission data stolen in a cyberattack on the infrastructure hosting its web sites

The European Commission is continuing to investigate the theft of data from its cloud infrastructure earlier this week. On Thursday,...

Lloyds Bank reveals how IT bug exposed transaction data

Lloyds Banking Group has identified the glitch that led to some of its customers being able to see details of...

Latest article

Security posture improvement in the AI era

It’s only been a few weeks since Anthropic announced the Claude Mythos Preview model and launched Project Glasswing with AWS and other...

Metasploit Wrap-Up 05/01/2026

MCP serverThis release our very own cdelafuente-r7 finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP lets AI applications...

Windows shell spoofing vulnerability puts sensitive data at risk

Microsoft and the US Cybersecurity and Infrastructure Security Agency (CISA) have sounded the alarm about a Windows shell spoofing vulnerability...

Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations

Torrance, United States / California, May 1st, 2026, CyberNewswire Criminal IP partners with Securonix to integrate Criminal IP’s Threat Intelligence into ThreatQ, allowing organizations...